Home
last modified time | relevance | path

Searched refs:bug_type (Results 1 – 6 of 6) sorted by relevance

/linux/mm/kasan/
A Dreport_generic.c94 bug_type = "out-of-bounds"; in get_shadow_bug_type()
98 bug_type = "slab-out-of-bounds"; in get_shadow_bug_type()
107 bug_type = "stack-out-of-bounds"; in get_shadow_bug_type()
110 bug_type = "use-after-free"; in get_shadow_bug_type()
114 bug_type = "slab-use-after-free"; in get_shadow_bug_type()
125 return bug_type; in get_shadow_bug_type()
133 bug_type = "null-ptr-deref"; in get_wild_bug_type()
135 bug_type = "user-memory-access"; in get_wild_bug_type()
137 bug_type = "wild-memory-access"; in get_wild_bug_type()
139 return bug_type; in get_wild_bug_type()
[all …]
A Dreport_tags.c37 if ((!info->cache || !info->object) && !info->bug_type) { in kasan_complete_mode_report_info()
38 info->bug_type = get_common_bug_type(info); in kasan_complete_mode_report_info()
82 if (!info->bug_type) in kasan_complete_mode_report_info()
83 info->bug_type = "slab-use-after-free"; in kasan_complete_mode_report_info()
97 if (!info->bug_type) in kasan_complete_mode_report_info()
98 info->bug_type = "slab-out-of-bounds"; in kasan_complete_mode_report_info()
105 if (!info->bug_type) in kasan_complete_mode_report_info()
106 info->bug_type = get_common_bug_type(info); in kasan_complete_mode_report_info()
A Dreport.c246 pr_err("BUG: KASAN: %s in %pS\n", info->bug_type, (void *)info->ip); in print_error_description()
322 if (strcmp(info->bug_type, "slab-out-of-bounds") == 0) in describe_object_addr()
324 else if (strcmp(info->bug_type, "slab-use-after-free") == 0) in describe_object_addr()
521 info->bug_type = "invalid-free"; in complete_report_info()
524 info->bug_type = "double-free"; in complete_report_info()
648 const char *bug_type; in kasan_non_canonical_hook() local
671 bug_type = "null-ptr-deref"; in kasan_non_canonical_hook()
673 bug_type = "probably user-memory-access"; in kasan_non_canonical_hook()
675 bug_type = "probably wild-memory-access"; in kasan_non_canonical_hook()
677 bug_type = "maybe wild-memory-access"; in kasan_non_canonical_hook()
[all …]
A Dkasan.h223 const char *bug_type; member
/linux/mm/kmsan/
A Dreport.c156 char *bug_type = NULL; in kmsan_report() local
174 bug_type = is_uaf ? "use-after-free" : "uninit-value"; in kmsan_report()
177 bug_type = is_uaf ? "kernel-infoleak-after-free" : in kmsan_report()
181 bug_type = is_uaf ? "kernel-usb-infoleak-after-free" : in kmsan_report()
190 pr_err("BUG: KMSAN: %s in %pSb\n", bug_type, in kmsan_report()
/linux/arch/arm/kernel/
A Dtraps.c365 enum bug_trap_type bug_type = BUG_TRAP_TYPE_NONE; in die() local
370 bug_type = report_bug(regs->ARM_pc, regs); in die()
371 if (bug_type != BUG_TRAP_TYPE_NONE) in die()

Completed in 12 milliseconds